On December 29, the Department of Homeland Security took an unusual step: it released a report detailing Russian civilian and military efforts to hack organizations, companies, and educational institutions in the United States. It’s sobering reading, and follow-on news reports have indicated the attackers’ success at penetrating networks well beyond those of the Democratic Party. You can read it here.
If the US Government, the Democratic Party, and universities with all of their resources were unable to stop the Russian attacks, what possible chance can a small/medium business have?
The answer is: more than you would think. Read More
It seems we don’t get a week without some major company being hacked, having data lost or released, or some kind of breach. With all that’s happening, security has been more on the forefront of IT than it has been in recent years. I’m generally surprised when I talk to end users and discover how little they understand about the importance of security and most importantly password security. I’m going to give a very high level view of one form of password cracking, the most prevalent, to my knowledge, and explain how the strength of your password effects an attacker’s ability to compromise it, and your systems.
Brute force hacking is a type of hacking where, in the case of passwords, every combination of letters, numbers, and symbols is tried until the correct password is found. As you can imagine this is a very time consuming process, but what difference does adding a number or symbol really make? Here’s the math. An 8 character password, upper and lower case only, providesRead More
Okay… Here’s how 90% of the networks I’ve seen have been built. Tell me if this sounds like you. You started with a fairly small, unsophisticated network. You probably had a single server, maybe even a workstation that was utilized as a server. You have a basic switch that you got from BestBuy or Amazon, probably DLink or Linksys. You had a basic firewall, probably SonicWall. As things progressed, you added to the network, maybe a bigger switch, Read More
Phishing—It’s not just about investment opportunities in Nigeria anymore!
It wasn’t that long ago that the most sophisticated scam email we would see in our Inboxes was a note from some supposed businessman looking for assistance with a cash transaction. The threat landscape has changed dramatically in the past year, with phishing emails becoming more advanced and almost indistinguishable from a legitimate email. All is not lost, however, and this guide will provide some tips for identifying the wolves among your flock of otherwise peaceful email. Read More
In IT there are a lot of Industry terms that aren’t well defined. Your IT provider may supply you with a technician and use terms ranging from Engineer, Field Engineer, Technician, and SysAdmin. SysAdmin, or Systems Administrator is generally considered to be the top of the food chain, as far as IT and Systems Engineering goes. The difference between a tech and a SysAdmin is similar to the difference between a cook and a Chef. Read More
Because IT is constantly evolving, it can be challenging for smaller businesses to remain updated with the newest technology. Part of this is due to the costs involved with making upgrades, but newer technology also requires knowledge to be used effectively. One way for businesses to stay relevant with IT is through the usage of managed IT services.
A growing number of employees are bringing their mobile devices to work, and are using them for work related tasks. The good news is that these devices increase employee productivity. The bad news is that mobile devices, when handled improperly, can become a security risk. In the past, many companies responded to mobile devices by simply banning them outright, but changes in technology and society are making such measures both onerous and ineffective. Below are some steps that employees can take to secure their devices in the work place, and employers should ensure that these measures are being followed.
The quality of the IT personnel you hire for your company can make the difference between success and failure. One reason for this is because hiring employees is expensive, but hiring the wrong employees is even more so. When you recruit the wrong people a great deal of energy must be spent resolving the situation which wastes time, money and opportunity costs. Below are some warning signs you should watch for during the hiring process, as they will help you weed out employees that don’t suit your needs.
The 21st century is no stranger to major technological advancements that rock the world. Today, a phone is not only considered as a telephone, but a mini-computer and personal assistant combined into a single device! Today, affordable, accessible mobile technology has changed the way we live and it is almost impossible to run a business without a phone and a telecommunications service.
For any business entity, a simple phone call can mean a fresh lead and a sales opportunity. The costs of telecom services are rising and the need to save money has become a highly important initiative for many businesses. Read on to find out more information on how you can cut down costs for your business while increasing the quality and overall efficiency of your operations.
Today, many business organizations permit the use of employees’ personal devices such as smartphones or tablets in the workplace. The ownership of such devices is now the norm and the BYOD (Bring Your Own Device) practice is a growing demand. Despite the buzz, caution must be taken as this phenomenon might risk your corporate data through the employees’ personal devices.
If your organization permits the use of employees’ devices within the business premises, there are a number of factors to consider when it comes to maintaining the security of your corporate data. Here are five BYOD concerns every employer should address.
- On December 29, the Department of Homeland Security took an unusual step: it released a . Read More
- It seems we don't get a week without some major company being hacked, having data lost or . Read More
- Okay... Here's how 90% of the networks I've seen have been built. Tell me if this sounds l. Read More
- January 2017 (2)
- December 2016 (2)
- November 2016 (1)
- December 2015 (4)
- November 2015 (4)
- October 2015 (4)
- September 2015 (4)
- August 2015 (4)
- July 2015 (2)
- June 2015 (1)
- March 2015 (1)
- February 2015 (1)
- January 2015 (4)
- December 2014 (5)
- July 2014 (2)
- June 2014 (3)
- December 2012 (1)
- August 2012 (1)
- June 2012 (1)
- March 2012 (2)
- January 2012 (2)